-
1
-
-
0003240332
-
SIP: Session Initiation Protocol
-
Rosenberg J et al (2002) SIP: Session Initiation Protocol. IETF RFC 3261.
-
(2002)
IETF RFC 3261
-
-
Rosenberg, J.1
-
2
-
-
0003288971
-
SIP: Session Initiation Protocol
-
Handley M et al (1999) SIP: Session Initiation Protocol. IETF RFC 2543.
-
(1999)
IETF RFC 2543
-
-
Handley, M.1
-
3
-
-
84872342828
-
ITU-T Recommendation Q. 700: Introduction to CCITT Signalling System 7
-
International Telecommunications Union
-
International Telecommunications Union (1993) ITU-T Recommendation Q. 700: Introduction to CCITT Signalling System 7. Recommendation Q. 700. International Telecommunications Union.
-
(1993)
Recommendation Q. 700. International Telecommunications Union
-
-
-
4
-
-
0003365506
-
HTTP authentication: basic and digest access authentication
-
Franks J et al (1999) HTTP authentication: basic and digest access authentication. IETF RFC 2617.
-
(1999)
IETF RFC 2617
-
-
Franks, J.1
-
5
-
-
0036870280
-
SIP security issues: the SIP authentication procedure and its processing load
-
Stefano S et al (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Network 16(16): 38-44.
-
(2002)
IEEE Network
, vol.16
, Issue.16
, pp. 38-44
-
-
Stefano, S.1
-
6
-
-
84881472647
-
Survrery of security vulnerabilities in session initial protocol
-
Geneiatakis D, Dagiuklas T, Kambourakis G, Lambrinoudakis C, Gritzalis S (2006) Survrery of security vulnerabilities in session initial protocol. IEEE Commun Surv Tutor 8(3): 68-81.
-
(2006)
IEEE Commun Surv Tutor
, vol.8
, Issue.3
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
-
7
-
-
33750013256
-
Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms
-
Sisalemd D, Kuthan J, Ehlerts S (2006) Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms. IEEE Network 20(5): 26-31.
-
(2006)
IEEE Network
, vol.20
, Issue.5
, pp. 26-31
-
-
Sisalemd, D.1
Kuthan, J.2
Ehlerts, S.3
-
9
-
-
77955431593
-
A Secure and efficient SIP authentication scheme for converged VoIP networks
-
Yoon E, Yoo K, Kim C, Hong Y, Jo M, Chen H (2010) A Secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33(14): 1674-1681.
-
(2010)
Comput Commun
, vol.33
, Issue.14
, pp. 1674-1681
-
-
Yoon, E.1
Yoo, K.2
Kim, C.3
Hong, Y.4
Jo, M.5
Chen, H.6
-
11
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang C et al (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24: 381-386.
-
(2005)
Comput Secur
, vol.24
, pp. 381-386
-
-
Yang, C.1
-
12
-
-
44549088249
-
A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography
-
Ring J, Choo K, Foo E, Looi M (2006) A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. Proc AusCert R& D Stream pp 61-72.
-
(2006)
Proc AusCert R& D Stream
, pp. 61-72
-
-
Ring, J.1
Choo, K.2
Foo, E.3
Looi, M.4
-
13
-
-
44549086712
-
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
-
Wang F, Zhang Y (2008) A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Comput Commun 31: 2142-2149.
-
(2008)
Comput Commun
, vol.31
, pp. 2142-2149
-
-
Wang, F.1
Zhang, Y.2
-
14
-
-
63149153148
-
A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment
-
Dimitris G, Costas L (2007) A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment. Telecommun Syst 36(4): 153-159.
-
(2007)
Telecommun Syst
, vol.36
, Issue.4
, pp. 153-159
-
-
Dimitris, G.1
Costas, L.2
-
15
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L et al (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comp Stand Inter 31(2): 286-291.
-
(2009)
Comp Stand Inter
, vol.31
, Issue.2
, pp. 286-291
-
-
Wu, L.1
-
16
-
-
74149091306
-
A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
-
Liao Y, Wang S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33(3): 372-380.
-
(2010)
Comput Commun
, vol.33
, Issue.3
, pp. 372-380
-
-
Liao, Y.1
Wang, S.2
-
17
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
Yoon E, Shin Y, Jeon I, Yoo K (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Techn Rev 27(3): 203-213.
-
(2010)
IETE Techn Rev
, vol.27
, Issue.3
, pp. 203-213
-
-
Yoon, E.1
Shin, Y.2
Jeon, I.3
Yoo, K.4
-
18
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
doi:10.1002/dac.1286
-
Xie Q (2011) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1): 47-54. doi: 10. 1002/dac. 1286.
-
(2011)
Int J Commun Syst.
, vol.25
, Issue.1
, pp. 6-13
-
-
Xie, Q.1
-
19
-
-
54349125537
-
A remote user authentication scheme without using smart cards
-
Rhee et al (2009) A remote user authentication scheme without using smart cards. Comp Stand Inter 31: 6-13.
-
(2009)
Comp Stand Inter
, vol.31
, pp. 6-13
-
-
Rhee1
-
20
-
-
85020598353
-
Identity-based cryptosystem and signature schemes
-
Shamir A (1984) Identity-based cryptosystem and signature schemes. In: Proc. Crypto 1984. LCNS, vol 196, pp 47-53.
-
(1984)
Proc. Crypto 1984. LCNS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
22
-
-
0002493959
-
Self-certified public keys
-
Girault M (1991) Self-certified public keys. In: Proc. Eurocrypt'91, pp 491-497.
-
(1991)
Proc. Eurocrypt'91
, pp. 491-497
-
-
Girault, M.1
-
24
-
-
84958760024
-
Elliptic curve based password authenticated key exchange protocols
-
Boyd C, Montague P, Nguyen K (2001) Elliptic curve based password authenticated key exchange protocols. In: Proc. ACISP 2001, pp 487-501.
-
(2001)
Proc. ACISP 2001
, pp. 487-501
-
-
Boyd, C.1
Montague, P.2
Nguyen, K.3
-
26
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N (1987) Elliptic curve cryptosystem. Math Comp 48: 203-209.
-
(1987)
Math Comp
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
27
-
-
33751060286
-
A lightweight scheme for securely and reliably locating SIP users
-
Kong L et al (2006) A lightweight scheme for securely and reliably locating SIP users. In Proc. IEEE workshop VoIP management and security: 9-17.
-
(2006)
Proc. IEEE workshop VoIP management and security
, pp. 9-17
-
-
Kong, L.1
-
30
-
-
35048866891
-
New security results on encrypted key exchange
-
Springer
-
Bresson E, Chevassut O, Pointcheval D (2004) New security results on encrypted key exchange. In: Proc. PKC 2004. LNCS vol 2947. Springer, pp 145-158.
-
(2004)
Proc. PKC 2004. LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
31
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
Abdalla M, Pointcheval D (2005) Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: Proc. FC'2005, pp 341-356.
-
(2005)
Proc. FC'2005
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
32
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
Choo K, Boyd C, Hitchcock Y (2005) Examining indistinguishability-based proof models for key establishment protocols. In: Proc. ASIACRYPT'2005, pp 585-604.
-
(2005)
Proc. ASIACRYPT'2005
, pp. 585-604
-
-
Choo, K.1
Boyd, C.2
Hitchcock, Y.3
-
33
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Proc. EUROCRYPT'2000, pp 139-155.
-
(2000)
Proc. EUROCRYPT'2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
34
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
Abdalla M, Bellare M, Rogaway P (2001) The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Proc. CT-RSA'2001, pp 143-158.
-
(2001)
Proc. CT-RSA'2001
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
|